Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
241-270 of 331
241-270 of 331
Filter
Emerson Macedo
Director of Engineering at M4U
advanced message queuing protocol, android (operating system), communication protocol, database, database transaction, ebay, facebook, hypertext transfer protocol, interface (computing), jakarta messaging, json, library (computing), memory leak, point of sale, proxy server, python (programming language), rabbitmq, representational state transfer, server (computing), social networking service, template (c++), transmission control protocol, twitter, use case, xml
Wojtek Mach
Software developer at Plataformatec
bit, bit numbering, byte, communication protocol, computer network, data type, database, database schema, database transaction, function (mathematics), handshaking, interface (computing), library (computing), network packet, network socket, port (computer networking), printer (computing), reliability engineering, server (computing), specification (technical standard), sql, streaming media, string (computer science), temperature, transmission control protocol
Amit Shah
Kernel / Hypervisor Engineer at Amazon
api, auction, booting, command-line interface, complexity, design, determinism, dimension, ethernet, flash memory, heat, input–output memory management unit, internet, knowledge, memory, mind, nothing, odor, ownership, patch (computing), real-time clock, reason, time, transmission control protocol
David Woodhouse
Principal Kernel / Hypervisor Engineer at Amazon
api, auction, booting, command-line interface, complexity, design, determinism, dimension, ethernet, flash memory, heat, input–output memory management unit, internet, knowledge, memory, mind, nothing, odor, ownership, patch (computing), real-time clock, reason, time, transmission control protocol
Christoffer Jerkeby
Senior Security Consultant at F-Secure
black hat, black hat briefings, black hat usa, black hat usa 2019, bracket, code injection, computer network, computer programming, control flow, domain name system, exception handling, http cookie, image scanner, interpreter (computing), load balancing (computing), localhost, login, netcat, password, port scanner, programming language, scripting language, tcl, transmission control protocol, unit testing, user agent, web browser, world wide web
Sara Bitan
Dr at Technion
address resolution protocol, bittorrent, black hat, black hat briefings, black hat usa, black hat usa 2019, c++, communication protocol, computer network, cryptographic hash function, cryptography , exploit (computer security), handshaking, http cookie, internet, internet of things, operating system, password, programmable logic controller, proprietary software, public-key cryptography, simple network management protocol, software , stuxnet, transmission control protocol, transport layer security, user interface, world wide web
Eli Biham
Prof at Technion
address resolution protocol, bittorrent, black hat, black hat briefings, black hat usa, black hat usa 2019, c++, communication protocol, computer network, cryptographic hash function, cryptography , exploit (computer security), handshaking, http cookie, internet, internet of things, operating system, password, programmable logic controller, proprietary software, public-key cryptography, simple network management protocol, software , stuxnet, transmission control protocol, transport layer security, user interface, world wide web
Uriel Malin
Security Researcher at Tel Aviv University
address resolution protocol, bittorrent, black hat, black hat briefings, black hat usa, black hat usa 2019, c++, communication protocol, computer network, cryptographic hash function, cryptography , exploit (computer security), handshaking, http cookie, internet, internet of things, operating system, password, programmable logic controller, proprietary software, public-key cryptography, simple network management protocol, software , stuxnet, transmission control protocol, transport layer security, user interface, world wide web
Avishai Wool
Prof at Tel Aviv University
address resolution protocol, bittorrent, black hat, black hat briefings, black hat usa, black hat usa 2019, c++, communication protocol, computer network, cryptographic hash function, cryptography , exploit (computer security), handshaking, http cookie, internet, internet of things, operating system, password, programmable logic controller, proprietary software, public-key cryptography, simple network management protocol, software , stuxnet, transmission control protocol, transport layer security, user interface, world wide web
David Renardy
Senior Research Scientist / Mathematician at Two Six Labs
adobe acrobat, best, worst and average case, black hat, black hat briefings, black hat usa, black hat usa 2019, computer network, computer security, data compression, deflate, denial-of-service attack, dynamic web page, handshaking, internet bot, java virtual machine, linux, microsoft windows, nondeterministic finite automaton, parsing, pdf, penetration test, portable network graphics, regular expression, remote desktop protocol, server (computing), time complexity, transmission control protocol, virtual network computing, virtualgl
Nathan Hauke
Senior Research Engineer at Two Six Labs
adobe acrobat, best, worst and average case, black hat, black hat briefings, black hat usa, black hat usa 2019, computer network, computer security, data compression, deflate, denial-of-service attack, dynamic web page, handshaking, internet bot, java virtual machine, linux, microsoft windows, nondeterministic finite automaton, parsing, pdf, penetration test, portable network graphics, regular expression, remote desktop protocol, server (computing), time complexity, transmission control protocol, virtual network computing, virtualgl
Nick Landers
Technical Lead at Silent Break Security
amazon s3, black hat, black hat 2019, black hat briefings, black hat usa, black hat usa 2019, cname record, domain name system, email, email box, firewall (computing), https, hypertext transfer protocol, internet, internet control message protocol, internet protocol, message transfer agent, microsoft outlook, microsoft sql server, name server, network address translation, reliability (computer networking), serverless computing, simple mail transfer protocol, slack (software), transmission control protocol, transport layer security, user datagram protocol, world wide web
Anthony Nocentino
Enterprise Architect at Centino Systems
background process, client (computing), community, computer network, computer terminal, consultant, credibility, credit, credit card, customer relationship management, discussion, education, employment, entry point, expert, file system, google chrome, hardware virtualization, hyper-v, hypervisor, information security, interest, internet control message protocol, interview, ip address, joey tribbiani, json, kernel (operating system), knowledge, kubernetes , lawyer, leadership, library (computing), linux, load balancing (computing), localhost, marketing communications, microservices, microsoft azure, microsoft sql server, multi-factor authentication, negotiation, network socket, openshift, openssh, operating system, password, payment, perspective, port (computer networking), port forwarding, powershell, powershell summit, price, proxy server, reason, receipt, router (computing), runtime system, server (computing), server core, socks, software repository, ssh (secure shell), strategy guide, system call, techsession, telecommuting, transmission control protocol, tunneling protocol, twitter, understanding, virtual private network, virtualization, windows powershell, windows registry, world wide web
Charles Givre
Vice President, Product Owner: Data & Analytics, Cybersecurity Technology and Controls at JPMorgan Chase & Co.
abstraction (computer science), ai, ai in cybersecurity, ai4, ai4 2020, ai4 cybersecurity, analytics, apache http server, apache kafka, application programming interface, artificial, artificial intelligence, authentication, charles givre, comma-separated values, command-line interface, computer file, computer network, cron, cut, copy, and paste, cyber, cyber security, cybersecurity, data analytics, data science, data visualization , data warehouse, database, datadistillr, debugging, denial-of-service attack, extract, transform, load, file system, finance, financial services, geographic information system, handshaking, hypertext transfer protocol, intelligence, internet geolocation, internet protocol, java database connectivity, jp morgan, jp morgan chase, jpmorgan chase, json, learning, machine, machine learning, microsoft excel, ml, mongodb, open database connectivity, password, pcap, power bi, project jupyter, proxy server, representational state transfer, security, select (sql), server (computing), six sigma, splunk, spreadsheet, sql, transmission control protocol, user agent, web browser, world wide web, xml, xml schema
James Modica
Director - Global Information Technology at Colgate-Palmolive
apple lisa, bandwidth (computing), cloud computing, cloud computing security, command-line interface, communication protocol, computer network, dashboard (business), data center, g suite, google, google data centers, identity management, ip address, load balancing (computing), macintosh, microsoft windows, patch (computing), provisioning (telecommunications), server (computing), subnetwork, transmission control protocol, user datagram protocol, virtual private network
Vincent Ricci
Cloud Engineer at Colgate-Palmolive
apple lisa, bandwidth (computing), cloud computing, cloud computing security, command-line interface, communication protocol, computer network, dashboard (business), data center, g suite, google, google data centers, identity management, ip address, load balancing (computing), macintosh, microsoft windows, patch (computing), provisioning (telecommunications), server (computing), subnetwork, transmission control protocol, user datagram protocol, virtual private network
Naomi Klamen
Customer Engineer at Google
apple lisa, bandwidth (computing), cloud computing, cloud computing security, command-line interface, communication protocol, computer network, dashboard (business), data center, g suite, google, google data centers, identity management, ip address, load balancing (computing), macintosh, microsoft windows, patch (computing), provisioning (telecommunications), server (computing), subnetwork, transmission control protocol, user datagram protocol, virtual private network
Joseph Foster
Cloud Computing Program Manager at NASA Goddard Space Flight Center
amazon elastic compute cloud, amazon web services, astronomy , columbia scientific balloon facility, computer network, domain name system, eastern shore of virginia, goddard space flight center, internet, ip address, lag, latency (engineering), load balancing (computing), nasa, openvpn, satellite, software-defined data center, space weather, subnetwork, synthetic-aperture radar, tcp window scale option, transmission control protocol, virtual private cloud, virtual private network, wallops flight facility
Kyle Hart
Senior Solutions Architect at Amazon Web Services
amazon elastic compute cloud, amazon web services, api, astronomy , autoscaling, backup, cloud computing, columbia scientific balloon facility, command-line interface, computer file, computer network, data center, database, domain name system, eastern shore of virginia, email, end user, goddard space flight center, health, internet, internet protocol, ip address, lag, latency (engineering), linux, load balancing (computing), microsoft windows, nasa, openvpn, operating system, patch (computing), powershell, satellite, software , software-defined data center, space weather, ssh (secure shell), subnetwork, synthetic-aperture radar, tcp window scale option, transmission control protocol, virtual private cloud, virtual private network, visualization (graphics), wallops flight facility, workload, world wide web
Darren House
Senior Solutions Architect at Amazon Web Services
amazon elastic compute cloud, api, architect, automation, blacklist (computing), botnet, cloud computing, communication protocol, computer file, computer security, cross-site scripting, cybercrime, cyberwarfare, database, domain name system, expert, health, internet, internet security, kill chain, lan manager, load balancing (computing), malware, metanoia (theology), mind, misinformation, pass the hash, password, port (computer networking), port scanner, powershell, proofpoint, inc., reason, risk, security, serverless computing, sql injection, transmission control protocol, usb human interface device class, use case, windows registry, workload, world wide web, zero-day (computing)
Nathan Case
OHIO at Amazon Web Services
anomaly detection, automation, cloud computing, command-line interface, computer, data center, email spam, force, gateway (telecommunications), genetic testing, hypertext transfer protocol, intelligence, learning, load balancing (computing), machine learning, password, python (programming language), reason, server (computing), signal-to-noise ratio, splunk, ssh (secure shell), transmission control protocol, user (computing), world wide web
Brian Calkin
Chief Technology Officer at Center for Internet Security (CIS)
amazon elastic compute cloud, amazon web services, apache hadoop, apache mxnet, big data, cloud computing, computer network, computer security, data center, domain name, extract, transform, load, file transfer protocol, firewall (computing), graphics processing unit, hash function, hash table, hyperparameter optimization, internet protocol, intrusion detection system, ipv4, linux, load balancing (computing), machine learning, netflow, network address translation, network monitoring, network tap, operating system, personal data, program optimization, research, router (computing), software testing, telephone, tensorflow, tor (anonymity network), transmission control protocol, upload, usability, wireless ad hoc network, world wide web
Linda Hedges
Principal HPC Application Engineer at AWS
amazon elastic compute cloud, amazon web services, authentication, cheating in video games, cloud computing, clustered file system, command-line interface, communication protocol, computer cluster, computer network, finance, hyper-threading, installation (computer programs), internet protocol suite, laptop, library (computing), linkedin, lustre (file system), message passing interface, parallel computing, rate of return, ssh (secure shell), transmission control protocol, web conferencing, world wide web
Jay Demmler
Sr. Principal Architect at Raytheon
amazon elastic compute cloud, amazon web services, authentication, cheating in video games, cloud computing, clustered file system, command-line interface, communication protocol, computer cluster, computer network, finance, hyper-threading, installation (computer programs), internet protocol suite, laptop, library (computing), linkedin, lustre (file system), message passing interface, parallel computing, rate of return, ssh (secure shell), transmission control protocol, web conferencing, world wide web
Haider Witwit
Sr. Solutions Architect, WWPS at Amazon Web Services
amazon alexa, amazon elastic compute cloud, amazon web services, backup, border gateway protocol, cloud computing, computer data storage, computer network, computing, database, denial-of-service attack, desktop virtualization, disaster recovery, domain name system, electronic health record, file system, gateway (telecommunications), internet, internet access, ipsec, lag, multiprotocol label switching, network switch, operating system, overlay network, private network, proxy server, replication (computing), router (computing), routing, software-defined data center, transmission control protocol, virtual lan, virtual machine, virtual private cloud, virtual private network, virtualization, vmware, vmware esxi, vmware vsphere
John Keller
CloudFront Enterprise Sales at Amazon Web Services
amazon elastic compute cloud, amazon s3, amazon web services, backup, cloud storage, computer data storage, computer network, content delivery network, denial-of-service attack, dynamic web page, file system, gateway (telecommunications), high availability, https, load balancing (computing), net neutrality, netapp, object storage, proxy server, security hacker, transmission control protocol, transport layer security, vulnerability (computing), web browser, world wide web
Balaji Iyer
Business Development Manager, AI and ML at AWS
amazon web services, apache hadoop, apache mxnet, api, apple, artificial cardiac pacemaker, automation, big data, bill joy, cloud computing, cluster analysis, computational complexity theory, computer file, computer network, computer security, computer vision, data center, deep learning, digitalglobe, dimensionality reduction, domain name, encryption, expert, graphics processing unit, health care, hyperparameter (machine learning), hyperparameter optimization, image segmentation, imagenet, intrusion detection system, k-means clustering, landsat program, last.fm, linux, load balancing (computing), machine learning, mathematical optimization, mobile app, mp3, multispectral image, natural language processing, netflow, network monitoring, network tap, personal data, peugeot, prediction, price.ru, privacy, program optimization, radiology, research, satellite imagery, science, server (computing), social media, software development, tensorflow, tor (anonymity network), training, validation, and test sets, transmission control protocol, truck driver, visualization (graphics), web portal, wi-fi, world wide web, валютный рынок, вконтакте, выставка достижений народного хозяйства, германия, донецкая народная республика, испания, лондон, марс, нейролингвистическое программирование, нтв, полтава, рязань, санкт-петербург, соединённые штаты америки, союз советских социалистических республик, томск, франция
Mathias Neerup
Scientific Assistant at University of Southern Denmark
apple inc., application software, communication protocol, community theater, computer data storage, computer file, computer hardware, css , database, disk storage, html, http cookie, ipv6, javascript, linux, mobile app, music, publish–subscribe pattern, scada, scalability, server (computing), streaming media, transmission control protocol, web framework, world wide web, youtube
Roberto Hashioka
Engineer at Forward
active directory, class (computer programming), cloud computing, computer network, database, device driver, device file, file format, file system, http cookie, https, hypertext transfer protocol, internet, kubernetes , linux distribution, load balancing (computing), microservices, object (computer science), open source, provisioning (telecommunications), proxy server, server (computing), software testing, transmission control protocol, transport layer security, world wide web
Michelle Au
Software Engineer at Google
active directory, class (computer programming), cloud computing, computer network, database, device driver, device file, file format, file system, http cookie, https, hypertext transfer protocol, internet, kubernetes , linux distribution, load balancing (computing), microservices, object (computer science), open source, provisioning (telecommunications), proxy server, server (computing), software testing, transmission control protocol, transport layer security, world wide web
1 2 3 4 5 6 7 8 9 10 11 12
241-270 of 331